.....
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {4000, 2, 1, fffff80002acf412}
Probably caused by : win32k.sys ( win32k!EngTextOut+ebd )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000004000, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff80002acf412, address which referenced memory
Debugging Details:
------------------
WRITE_ADDRESS: GetPointerFromAddress: unable to read from fffff80002ccd100
0000000000004000
CURRENT_IRQL: 2
FAULTING_IP:
nt!KxWaitForLockOwnerShip+12
fffff800`02acf412 48890a mov qword ptr [rdx],rcx
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xA
PROCESS_NAME: chrome.exe
TRAP_FRAME: fffff88008402a40 -- (.trap 0xfffff88008402a40)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000fffff900 rbx=0000000000000000 rcx=fffff88008402c60
rdx=0000000000004000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80002acf412 rsp=fffff88008402bd0 rbp=fffff88008402c40
r8=0000000000000000 r9=0000000000000000 r10=fffffa8003902e10
r11=fffff80002cd0a80 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!KxWaitForLockOwnerShip+0x12:
fffff800`02acf412 48890a mov qword ptr [rdx],rcx ds:0001:00000000`00004000=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80002a9d2a9 to fffff80002a9dd00
STACK_TEXT:
fffff880`084028f8 fffff800`02a9d2a9 : 00000000`0000000a 00000000`00004000 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
fffff880`08402900 fffff800`02a9bf20 : fffff6fc`80611630 00000000`00000111 fffffa80`011b2720 fffffa80`011b2720 : nt!KiBugCheckDispatch+0x69
fffff880`08402a40 fffff800`02acf412 : 00000000`00000002 00000000`00000001 00000000`00000004 fffff900`c22c3002 : nt!KiPageFault+0x260
fffff880`08402bd0 fffff800`02aae2bd : fffffa80`011b2720 00000000`0000191d 00000000`00000000 fffff880`060b9c00 : nt!KxWaitForLockOwnerShip+0x12
fffff880`08402c00 fffff800`02a8ea74 : 00000000`00000000 ffffffff`ffffffff 00000000`00000000 fffffa80`00000001 : nt!MiInsertPageInFreeOrZeroedList+0x55d
fffff880`08402d10 fffff800`02a8df41 : fffff900`00000000 00000000`00000001 fffff960`00000000 00000000`00000000 : nt!MiDeleteSystemPagableVm+0x254
fffff880`08402e70 fffff800`02bc65b1 : 00000000`000002c8 fffff900`c0165b90 fffff900`c22c5000 00000000`000022c3 : nt!MiFreePagedPoolPages+0x12d
fffff880`08402fc0 fffff800`02bca557 : 00000000`00000000 fffff880`08403190 fffff880`08403110 00000000`00000001 : nt!MiFreePoolPages+0x2b1
fffff880`084030d0 fffff960`00085009 : fffff900`c0165b90 fffff900`c22c3020 fffff900`6f746547 fffff900`00000000 : nt!ExFreePoolWithTag+0x7c7
fffff880`08403180 fffff960`00083b69 : fffff900`00000052 fffff880`0000002a fffff900`c1e772c0 fffff880`084036d0 : win32k!EngTextOut+0xebd
fffff880`08403510 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : win32k!GreExtTextOutWLocked+0x1d29
STACK_COMMAND: kb
FOLLOWUP_IP:
win32k!EngTextOut+ebd
fffff960`00085009 eb05 jmp win32k!EngTextOut+0xec4 (fffff960`00085010)
SYMBOL_STACK_INDEX: 9
SYMBOL_NAME: win32k!EngTextOut+ebd
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: win32k
IMAGE_NAME: win32k.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4de066b3
FAILURE_BUCKET_ID: X64_0xA_win32k!EngTextOut+ebd
BUCKET_ID: X64_0xA_win32k!EngTextOut+ebd
Followup: MachineOwner
---------